{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:52:47Z","timestamp":1769763167285,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T00:00:00Z","timestamp":1707350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T00:00:00Z","timestamp":1707350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62062044"],"award-info":[{"award-number":["62062044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762054"],"award-info":[{"award-number":["61762054"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00371-024-03271-z","type":"journal-article","created":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T14:03:04Z","timestamp":1707400984000},"page":"8791-8807","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A novel robust digital image watermarking scheme based on attention U-Net++\u2009structure"],"prefix":"10.1007","volume":"40","author":[{"given":"Liuhao","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4345-1651","authenticated-orcid":false,"given":"Yi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yixiang","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Junxiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,8]]},"reference":[{"issue":"1","key":"3271_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","volume":"12","author":"H Tao","year":"2014","unstructured":"Tao, H., Chongmin, L., Zain, J.M., Abdalla, A.N.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12(1), 122\u2013138 (2014)","journal-title":"J. Appl. Res. Technol."},{"issue":"4","key":"3271_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s13735-020-00197-9","volume":"9","author":"A Ray","year":"2020","unstructured":"Ray, A., Roy, S.: Recent trends in image watermarking techniques for copyright protection: a survey. Int. J. Multimed. Inf. Retriev. 9(4), 249\u2013270 (2020)","journal-title":"Int. J. Multimed. Inf. Retriev."},{"issue":"8","key":"3271_CR3","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.3923\/itj.2010.1725.1738","volume":"9","author":"J Qin","year":"2010","unstructured":"Qin, J., Xiang, X., Wang, M.X.: A review on detection of LSB matching steganography. Inf. Technol. J. 9(8), 1725\u20131738 (2010)","journal-title":"Inf. Technol. J."},{"issue":"6","key":"3271_CR4","doi-asserted-by":"publisher","first-page":"9315","DOI":"10.1007\/s11042-020-09943-x","volume":"80","author":"S Kumar","year":"2021","unstructured":"Kumar, S., Singh, B.K.: Entropy based spatial domain image watermarking and its performance analysis. Multimedia Tools  Appl. 80(6), 9315\u20139331 (2021)","journal-title":"Multimedia Tools Appl."},{"issue":"8","key":"3271_CR5","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1002\/int.22461","volume":"36","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Su, Q.: A spatial domain-based color image blind watermarking scheme integrating multilevel discrete Hartley transform. Int. J. Intell. Syst. 36(8), 4321\u20134345 (2021)","journal-title":"Int. J. Intell. Syst."},{"issue":"1","key":"3271_CR6","first-page":"151","volume":"66","author":"H Sadreazami","year":"2018","unstructured":"Sadreazami, H., Amini, M.: A robust image watermarking scheme using local statistical distribution in the contourlet domain. IEEE Trans. Circuits Syst. II Express Briefs 66(1), 151\u2013155 (2018)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"3271_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.115972","volume":"88","author":"XY Wang","year":"2020","unstructured":"Wang, X.Y., Wen, T.T., Wang, L., Niu, P.P., Yang, H.Y.: Contourlet domain locally optimum image watermark decoder using Cauchy mixtures based vector HMT model. Signal Process. Image Commun. 88, 115972 (2020)","journal-title":"Signal Process. Image Commun."},{"key":"3271_CR8","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jvcir.2019.05.012","volume":"62","author":"XY Wang","year":"2019","unstructured":"Wang, X.Y., Zhang, S.Y., Wang, L., Yang, H.Y., Niu, P.P.: Locally optimum image watermark decoder by modeling NSCT domain difference coefficients with vector based Cauchy distribution. J. Vis. Commun. Image Represent. 62, 309\u2013329 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"3271_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.115946","volume":"88","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Zhang, S., Yang, J.: Color image watermark decoder by modeling quaternion polar harmonic transform with BKF distribution. Signal Process. Image Commun. 88, 115946 (2020)","journal-title":"Signal Process. Image Commun."},{"key":"3271_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103123","volume":"77","author":"XY Wang","year":"2021","unstructured":"Wang, X.Y., Tian, J., Tian, J.L., Niu, P.P., Yang, H.Y.: Statistical image watermarking using local RHFMs magnitudes and beta exponential distribution. J. Vis. Commun. Image Represent. 77, 103123 (2021)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"18","key":"3271_CR11","doi-asserted-by":"publisher","first-page":"27717","DOI":"10.1007\/s11042-021-11056-y","volume":"80","author":"XY Wang","year":"2021","unstructured":"Wang, X.Y., Shen, X., Tian, J.L., Niu, P.P., Yang, H.Y.: Statistical image watermark decoder based on local frequency-domain Exponent-Fourier moments modeling. Multimedia Tools  Appl. 80(18), 27717\u201327755 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"3271_CR12","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.cose.2016.11.016","volume":"65","author":"H Kandi","year":"2017","unstructured":"Kandi, H., Mishra, D., Gorthi, S.R.S.: Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput. Secur. 65, 247\u2013268 (2017)","journal-title":"Comput. Secur."},{"key":"3271_CR13","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L. (2018).: Hidden: Hiding data with deep networks. In\u00a0Proceedings of the European conference on computer vision (ECCV). 657\u2013672 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"3271_CR14","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: Invisible hyperlinks in physical photographs. In\u00a0Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR). 2117\u20132126 (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"issue":"7","key":"3271_CR15","doi-asserted-by":"publisher","first-page":"7094","DOI":"10.1109\/TCYB.2020.3037208","volume":"52","author":"J Jia","year":"2020","unstructured":"Jia, J., Gao, Z., Chen, K., Hu, M., Min, X., Zhai, G., Yang, X.: RIHOOP: robust invisible hyperlinks in offline and online photographs. IEEE Trans. Cybern. 52(7), 7094\u20137106 (2020)","journal-title":"IEEE Trans. Cybern."},{"key":"3271_CR16","unstructured":"Zhang, K.A.., Cuesta-Infante, A.., Veeramachaneni, K.: Steganogan: pushing the limits of image steganography.\u00a0arXiv preprint arXiv:1901.03892,\u00a02 (2019)"},{"key":"3271_CR17","doi-asserted-by":"crossref","unstructured":"Wengrowski, E., Dana, K.: Light field messaging with deep photographic steganography. In:\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition\u00a0(CVPR), pp. 1515\u20131524 (2019)","DOI":"10.1109\/CVPR.2019.00161"},{"key":"3271_CR18","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: Convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI, pp. 234\u2013241 (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"3271_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Rahman Siddiquee, M. M., Tajbakhsh, N., Liang, J.: Unet++: A nested u-net architecture for medical image segmentation. In: Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support, pp. 3\u201311 (2018)","DOI":"10.1007\/978-3-030-00889-5_1"},{"key":"3271_CR20","unstructured":"Oktay, O., Schlemper, J., Folgoc, L. L., Lee, M., Heinrich, M., Misawa, K., Rueckert, D.: Attention u-net: learning where to look for the pancreas.\u00a0arXiv preprint arXiv:1804.03999. (2018)"},{"key":"3271_CR21","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In:\u00a0International Conference on Machine Learning, pp. 214\u2013223 (2017)"},{"issue":"17","key":"3271_CR22","doi-asserted-by":"publisher","first-page":"24347","DOI":"10.1007\/s11042-022-12282-8","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Darwish, M.M.: Robust color image watermarking using multiple fractional-order moments and chaotic map. Multimedia Tools Appl. 81(17), 24347\u201324375 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"3271_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103007","volume":"70","author":"KM Hosny","year":"2021","unstructured":"Hosny, K.M., Darwish, M.M.: New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed. Signal Process. Control 70, 103007 (2021)","journal-title":"Biomed. Signal Process. Control"},{"key":"3271_CR24","doi-asserted-by":"publisher","first-page":"38821","DOI":"10.1109\/ACCESS.2022.3165813","volume":"10","author":"M Magdy","year":"2022","unstructured":"Magdy, M., Ghali, N.I., Ghoniemy, S., Hosny, K.M.: Multiple zero-watermarking of medical images for internet of medical things. IEEE Access 10, 38821\u201338831 (2022)","journal-title":"IEEE Access"},{"key":"3271_CR25","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s00371-020-01945-y","volume":"37","author":"Z Yuan","year":"2021","unstructured":"Yuan, Z., Su, Q., Liu, D., Zhang, X.: A blind image watermarking scheme combining spatial domain and frequency domain. Vis. Comput. 37, 1867\u20131881 (2021)","journal-title":"Vis. Comput."},{"issue":"15","key":"3271_CR26","doi-asserted-by":"publisher","first-page":"5612","DOI":"10.3390\/s22155612","volume":"22","author":"DS Khafaga","year":"2022","unstructured":"Khafaga, D.S., Karim, F.K., Darwish, M.M., Hosny, K.M.: Robust zero-watermarking of color medical images using multi-channel Gaussian\u2013Hermite moments and 1D Chebyshev chaotic map. Sensors 22(15), 5612 (2022)","journal-title":"Sensors"},{"issue":"12","key":"3271_CR27","doi-asserted-by":"publisher","first-page":"17185","DOI":"10.1007\/s11042-022-12037-5","volume":"81","author":"KM Hosny","year":"2022","unstructured":"Hosny, K.M., Magdi, A., Lashin, N.A., El-Komy, O., Salah, A.: Robust color image watermarking using multi-core Raspberry pi cluster. Multimedia Tools Appl. 81(12), 17185\u201317204 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"3271_CR28","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny, K.M., Darwish, M.M., Fouda, M.M.: Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9, 47425\u201347435 (2021)","journal-title":"IEEE Access"},{"issue":"6","key":"3271_CR29","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1007\/s00371-022-02406-4","volume":"39","author":"SP Vaidya","year":"2023","unstructured":"Vaidya, S.P.: Fingerprint-based robust medical image watermarking in hybrid transform. Vis. Comput. 39(6), 2245\u20132260 (2023)","journal-title":"Vis. Comput."},{"key":"3271_CR30","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.aej.2023.07.068","volume":"78","author":"MM Eltoukhy","year":"2023","unstructured":"Eltoukhy, M.M., Khedr, A.E., Abdel-Aziz, M.M., Hosny, K.M.: Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption. Alex. Eng. J. 78, 517\u2013529 (2023)","journal-title":"Alex. Eng. J."},{"issue":"6","key":"3271_CR31","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/TCSVT.2008.918843","volume":"18","author":"S Xiang","year":"2008","unstructured":"Xiang, S., Kim, H.J., Huang, J.: Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans. Circuits Syst. Video Technol. 18(6), 777\u2013790 (2008)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"3271_CR32","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1109\/TCYB.2013.2245415","volume":"43","author":"H Tian","year":"2013","unstructured":"Tian, H., Zhao, Y., Ni, R., Qin, L., Li, X.: LDFT-based watermarking resilient to local desynchronization attacks. IEEE Trans. Cybern. 43(6), 2190\u20132201 (2013)","journal-title":"IEEE Trans. Cybern."},{"key":"3271_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108371","volume":"192","author":"XY Wang","year":"2022","unstructured":"Wang, X.Y., Shen, X., Tian, J.L., Niu, P.P., Yang, H.Y.: Statistical image watermark decoder using high-order difference coefficients and bounded generalized Gaussian mixtures-based HMT. Signal Process. 192, 108371 (2022)","journal-title":"Signal Process."},{"key":"3271_CR34","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1016\/j.procs.2020.09.187","volume":"176","author":"A Zotin","year":"2020","unstructured":"Zotin, A., Favorskaya, M., Proskurin, A., Pakhirka, A.: Study of digital textual watermarking distortions under Internet attacks in high resolution videos. Procedia Comput. Sci. 176, 1633\u20131642 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"3271_CR35","unstructured":"Mun, S.M., Nam, S.H., Jang, H.U., Kim, D., Lee, H.K.: A robust blind watermarking using convolutional neural network.\u00a0arXiv preprint arXiv:1704.03248 (2017)"},{"key":"3271_CR36","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhan, R., Chang, H., Yang, F., Milanfar, P.: Distortion agnostic deep watermarking. In:\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13548\u201313557 (2020)","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"3271_CR37","doi-asserted-by":"crossref","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Bengio, Y.: Generative adversarial networks.\u00a0Commun. ACM. 63(11), 139\u2013144 (2020)","DOI":"10.1145\/3422622"},{"key":"3271_CR38","doi-asserted-by":"crossref","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. In: Pacific-Rim Conference on Multimedia, pp. 534\u2013544 (2018)","DOI":"10.1007\/978-3-319-77380-3_51"},{"issue":"5","key":"3271_CR39","doi-asserted-by":"publisher","first-page":"1724","DOI":"10.1109\/JBHI.2020.3024188","volume":"25","author":"E Thomas","year":"2018","unstructured":"Thomas, E., Pawan, S.J., Kumar, S., Horo, A., Niyas, S., Vinayagamani, S., Rajan, J.: Multi-res-attention UNet: a CNN model for the segmentation of focal cortical dysplasia lesions from magnetic resonance images. IEEE J. Biomed. Health Inform. 25(5), 1724\u20131734 (2018)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"3271_CR40","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.3389\/fbioe.2020.605132","volume":"8","author":"Q Jin","year":"2020","unstructured":"Jin, Q., Meng, Z., Sun, C., Cui, H., Su, R.: RA-UNet: ahybrid deep attention-aware network to extract liver and tumor in CT scans. Front. Bioeng. Biotechnol. 8, 1471 (2020)","journal-title":"Front. Bioeng. Biotechnol."},{"key":"3271_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In:\u00a0Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 586\u2013595 (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"3271_CR42","unstructured":"Kingma, D. P., Ba, J.: Adam: a method for stochastic optimization.\u00a0arXiv preprint arXiv:1412.6980. (2014)"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03271-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-024-03271-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-024-03271-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T09:09:04Z","timestamp":1731402544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-024-03271-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,8]]},"references-count":42,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["3271"],"URL":"https:\/\/doi.org\/10.1007\/s00371-024-03271-z","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,8]]},"assertion":[{"value":"8 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}